Firewall in Linux - Essay Example

Only on StudentShare

Extract of sample
Firewall in Linux

It is often referred to as a packet filter as it examines each packet transferred in every network connection to, from, and within your computer. iptables replaced ipchains in the 2.4 kernel and added many new features including connection tracking (also known as stateful packet filtering).1
This means that the configuration for the firewall is set to "deny all connections" by default and the only way to establish connections between to point or two entity, we have to explicitly add new rules for them.
The term "INPUT" refers to any packet that is coming to this computer, "OUTPUT" means any packet that is generated by this computer and is leaving it. The term "FORWARD" also means the packets that are arriving from another computer but their final destination is one other computer. In fact we have used this computer to transit the packets between two different computers. The term "DROP" means that "the packet is not allowed through the firewall and the sender of the packet is not notified."2
In our firewall rule set, as you have seen above in section one, all incoming and outgoing packets are dropped unless we add new rules that allow our system to deal with. We have only allowed the system to use one connection by defining only one connection named "eth0" in the rules as follows: ...
Download paper


In this paper, we will have a short introduction to firewall in Linux based systems. We will discuss the way we can use IP Tables to set firewall rules in Linux environment and we will aim to an IP Table firewall definition for a system that requires some special settings…
Author : mandyhowe

Related Essays

Heteregeneous Networks
Since its introduction in 1999, SFU plays a key position that supports heterogeneous networks like Windows and UNIX systems to functionally integrate. SFU has kept up with the changing times, it has extended and substantially improved the tools and bi-directional integration of the solution and improved functional performance.
34 pages (8534 words) Coursework
Networking Assignment
What this means for attackers is that once they penetrate a single machine on a network they can then observe all traffic passing through the network. This allows intruders to quickly collect passwords and account names for many users. And all too often a password good one place is good another. In order to save from this vulnerability, you have to save a copy of Kernel offline because the advance hackers even patches the kernel of Unix system so that the system can not detect that it is under promiscuous mode by the help of "ifconfig" and "tcpdump" commands. (http:/
7 pages (1757 words) Essay
Firewall Architectures and Techniques A study on the high speed network security they provide.
Different firewall architectures and techniques provide different correlation of performance vs. security. When considering alternative firewall technologies, a common question is "what are the trade-offs between performance and security" (Cisco Systems, 2002) To answer to this question, various firewall architectures should be regarded and analysed.
2 pages (502 words) Essay
Vulnerabilities of Networks and Internet
The various networking security strategies are discussed along with alternatives.
6 pages (1506 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!